Analysis

  • max time kernel
    100s
  • max time network
    140s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241211-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    31-12-2024 15:35

General

  • Target

    ROBLOX Cheat.zip

  • Size

    21.3MB

  • MD5

    f292a7b52c861a26b1ba1611499bddde

  • SHA1

    f6398a6ab23d51dd5b1eac2f72a49990306e1f99

  • SHA256

    403eca5a2ba82d0195197853d896c2bd1b13297fc4fe9e8ffd732b6fab3fdef4

  • SHA512

    e9acb37910af2b5be7c07be32977316dd318a242e30927914d1477bb4b347bc02fb9b83c283a5f3ffb3dea8c85b9092d55a6eab8e14c58abf74c55730a501b34

  • SSDEEP

    393216:COCMj1RUE3bUXOb5xklPBCNyYzE9t8svlUhnwXG3+iho0r4nMrJzcNars:COL7rUSbGY89WPh6tK4neJQNGs

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\ROBLOX Cheat.zip"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1268

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads